F. Baader and T. Nipkow, Term Rewriting and All That, 1999.

F. Biondi, S. Josse, A. Legay, and T. Sirvent, Effectiveness of Synthesis in Concolic Deobfuscation, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01241356

B. Buchberger and R. Loos, Algebraic Simplification, Computer Algebra, pp.11-43, 1982.

V. Bukasof and D. Schelkunov, Deobfuscation and beyond. ZeroNights conference, 2014.

J. Carette, Understanding expression simplification, Proceedings of the 2004 international symposium on Symbolic and algebraic computation , ISSAC '04, pp.72-79, 2004.
DOI : 10.1145/1005285.1005298

C. Collberg and C. Thomborson, Watermarking, tamper-proofing, and obfuscation - tools for software protection, IEEE Transactions on Software Engineering, vol.28, issue.8, pp.735-746, 2002.
DOI : 10.1109/TSE.2002.1027797

B. Dang, A. Gazet, E. Bachaalany, and S. Josse, Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation, 2014.

L. De-moura and N. Bjørner, Z3: An Efficient SMT Solver, Proceedings of the Theory and Practice of Software, 14th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS'08/ETAPS'08, pp.337-340
DOI : 10.1007/978-3-540-78800-3_24

F. Desclaux, Miasm: Framework de reverse engineering, 2012.

F. Gabriel, Deobfuscation: recovering an OLLVM-protected program. Quarkslab's blog, 2014. http://blog.quarkslab.com/ deobfuscation-recovering-an-ollvm-protected-program

Y. X. Gu, C. Liem, and Y. Zhou, System and method providing dependency networks throughout applications for attack resistance, App. PCT, 2012.

H. J. Johnson, Y. X. Gu, and Y. Zhou, System and method of interlocking to protect software-mediated program and device behaviors. US Patent App, 2008.

A. Kandanchatha and Y. Zhou, System and method for obscuring bit-wise and two's complement integer computations in software. US Patent App, 2005.

D. Khovratovich and I. Nikoli´cnikoli´c, Rotational Cryptanalysis of ARX, Fast Software Encryption, pp.333-346, 2010.
DOI : 10.1007/978-3-642-13858-4_19

A. Klimov and A. Shamir, A New Class of Invertible Mappings, Cryptographic Hardware and Embedded Systems -CHES 2002, pp.470-483, 2003.
DOI : 10.1007/3-540-36400-5_34

D. Kroening and O. Strichman, Decision Procedures: An Algorithmic Point of View, 2008.
DOI : 10.1007/978-3-662-50497-0

T. R. Kuphaldt, Lessons in Electric Circuits IV - Digital, Chap. 7 -Boolean Algebra, 1996.

X. Lai and J. L. Massey, A Proposal for a New Block Encryption Standard, Advances in Cryptology ? EUROCRYPT '90, pp.389-404, 1991.
DOI : 10.1007/3-540-46877-3_35

J. Lim and T. Reps, A System for Generating Static Analyzers for Machine Instructions, Proceedings of the Joint European Conferences on Theory and Practice of Software 17th International Conference on Compiler Construction, CC'08/ETAPS'08, pp.36-52, 2008.
DOI : 10.1007/978-3-540-78791-4_3

. Maple, Maplesoft, a division of Waterloo Maple Inc

J. T. Mcdonald, Capturing the Essence of Practical Obfuscation, Proceedings of the 6th International Conference on Information Systems, Technology and Management, ICISTM 2012, pp.451-456, 2012.
DOI : 10.1007/978-3-642-29166-1_44

C. Mougey and F. Gabriel, DRM obfuscation versus auxiliary attacks. Recon conference, 2014.

D. Plump, Handbook of Graph Grammars and Computing by Graph Transformation, Applications, Languages, and Tools, chapter Term Graph Rewriting, pp.3-61, 1999.

R. M. Stallman and . Community, Using The Gnu Compiler Collection: A Gnu Manual For Gcc Version 4.3.3. CreateSpace, 2009.

F. Saudel and J. Salwan, Triton: A dynamic symbolic execution framework In Symposium sur la sécurité des technologies de l'information et des communications, pp.31-54, 2015.

J. Vuillemin, Digital Algebra and Circuits, Theory and Practice, pp.733-746, 2003.
DOI : 10.1007/978-3-540-39910-0_31

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.96.2652

H. S. Warren, Hacker's Delight, 2002.

I. Wegener, The Complexity of Boolean Functions, 1987.

Y. Zhou and A. Main, Diversity Via Code Transformations: A Solution For NGNA Renewable Security The NCTA Technical Papers, 2006.

Y. Zhou, A. Main, Y. X. Gu, and H. Johnson, Information Hiding in Software with Mixed Boolean-Arithmetic Transforms, 8th International Workshop in Information Security Applications (WISA'07), pp.61-75, 2007.
DOI : 10.1007/978-3-540-77535-5_5